Foreground object detection is one of the major important tasks in the field of computer vision which attempt to discover important objects in still image or image sequences or locate related targets from the scene. Foreground objects detection is very important for several approaches like object recognition, surveillance, image annotation, and image retrieval, etc. In this work, a proposed method has been presented for detection and separation foreground object from image or video in both of moving and stable targets. Comparisons with general foreground detectors such as background subtraction techniques our approach are able to detect important target for case the target is moving or not and can separate foreground object with high details.
For extraction chloro anion complexes of Cd2+ and Hg2+ used many organic agents as extractant according to liquid ion exchange method such as α-Naphthyl amine (α-NA), 4-Amino benzoic acid (4-ABA), 2-[(4-Carboxy methyl phenyl) azo]-4,5-diphenyl imidazole (4CMePADPI) and Cryptand (C222). This study includes definition hydrochloric acid concentration in aqueous phase and shaking with organic phase necessary for extraction as well as shaking time, organic solvent effect, interferences and alkaline salt effect. Thermodynamic showed the ion exchange reaction was exothermic for α-NA, C222 and endothermic for 4-ABA, 4-CMePADPI for extraction CdCl4=, but for extraction HgCl4= was exothermic with 4-ABA, 4CMePADPI and C222 but
... Show MoreIn this research we will present the signature as a key to the biometric authentication technique. I shall use moment invariants as a tool to make a decision about any signature which is belonging to the certain person or not. Eighteen voluntaries give 108 signatures as a sample to test the proposed system, six samples belong to each person were taken. Moment invariants are used to build a feature vector stored in this system. Euclidean distance measure used to compute the distance between the specific signatures of persons saved in this system and with new sample acquired to same persons for making decision about the new signature. Each signature is acquired by scanner in jpg format with 300DPI. Matlab used to implement this system.
Making the data secure is more and more concerned in the communication era. This research is an attempt to make a more secured information message by using both encryption and steganography. The encryption phase is done with dynamic DNA complementary rules while DNA addition rules are done with secret key where both are based on the canny edge detection point of the cover image. The hiding phase is done after dividing the cover image into 8 blocks, the blocks that are used for hiding selected in reverse order exception the edge points. The experiments result shows that the method is reliable with high value in PSNR
LK Abood, RA Ali, M Maliki, International Journal of Science and Research, 2015 - Cited by 2
The US invasion of Iraq in 2003 unleashed the repressed national aspirations of the Kurdish people. After the colonial powers, especially Britain, failed to establish a homeland of scattered Kurds in Iraq, Turkey, Syria and Iran, Iraq's Kurds managed to establish a semi-independent state in the north of the country Which lasted decades against the central authority in Baghdad in protest against what they call the forced integration of Kurds in the Iraqi state, and to obtain more rights and privileges as partners in this country. The federal region in the Kurdistan region of Iraq has become a reality, and it is eager not to strengthen its authority in return for the authority of the central government, but to annex other areas inhabited b
... Show MoreThe effect of the tensor term in the Skyrme interaction has been estimated in calculating the static and dynamic nuclear properties in sd and fp-shell model spaces nuclei. The nuclear shell gaps have been studied with different Skyrme parameterizations; Skxta and Skxtb with tensor interaction, SkX, SkM, and SLy4 without tensor interaction, and Skxcsb with consideration of the effect of charge symmetry breaking. We have examined the stability of N = 28 for 42Si and 48Ca. The results showed that the disappearance of the magicity occurs in the shell closure of 42Si. Furthermore, excitation energy, quadrupole deformation, neutron separation energy, pairing energy, and density profile have also been calculated. Quadrupole deformation indicates a
... Show MoreOne of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show MoreUmbilical cord blood (UCB) contains hematopoietic and mesenchymal stem cells(HSCs,MSCs) that have proven useful clinically to reconstitute the hematopoietic system in children and some adults . Fifteen cord blood samples were collected from placenta of newly delivered women in AlKadhemia hospital in Baghdad for normal vaginal delivery. Mono nucleated cells (MNCs) were isolated by using density gradient centrifugation and the MNCs count and viability were determinated by trypan blue.MNCs were cryopreserved using the cryoprotectant solution of 10% concentration of dimethyl sulfoxid (DMSO)using slow cooling and rapid thaw. The aim of the present study
... Show More